Sciweavers

2847 search results - page 517 / 570
» Dynamic Distribution of Java Applications
Sort
View
WCRE
2010
IEEE
15 years 17 days ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Saumya K. Debray, Jay Patel
WINET
2010
137views more  WINET 2010»
15 years 17 days ago
Topology control for fault-tolerant communication in wireless ad hoc networks
Abstract. Fault-tolerant communication and energy efficiency are important requirements for future-generation wireless ad hoc networks, which are increasingly being considered also...
Bernd Thallner, Heinrich Moser, Ulrich Schmid
MASS
2010
150views Communications» more  MASS 2010»
15 years 4 days ago
A non-replication multicasting scheme in delay tolerant networks
Delay tolerant networks (DTNs) are a special type of wireless mobile networks which may lack continuous network connectivity. Multicast is an important routing function that suppor...
Jie Wu, Yunsheng Wang
ICETET
2009
IEEE
14 years 12 months ago
High Performance WDM Using Semiconductor Tunable Laser
Advances in optical networking have lead to the explosive growth of communication network. Telecom applications began to drive significant investments into this field to support t...
S. S. Agrawal, K. D. Kulat, M. B. Daigavane
CORR
2010
Springer
119views Education» more  CORR 2010»
14 years 11 months ago
On Probabilistic Parallel Programs with Process Creation and Synchronisation
We initiate the study of probabilistic parallel programs with dynamic process creation and synchronisation. To this end, we introduce probabilistic split-join systems (pSJSs), a mo...
Stefan Kiefer, Dominik Wojtczak